Riffle (anonymity network)
Riffle is an anonymity network developed by researchers at MIT and EPFL as a response to the problems of the Tor network.
Riffle employs a verifiable shuffle and a symmetric-key algorithm.[1][2] Like Tor, it utilizes onion routing.[3] According to MIT's Larry Hardesty, researchers at MIT and the Qatar Computing Research Institute demonstrated a vulnerability in Tor's design.[4]
Messages sent over Riffle are not forwarded if they have been altered by a compromised server. The server has to attach proof in order to forward the message.[5]
The main intended use-case is anonymous file sharing. According to the lead project researcher, Riffle is intended to be complementary to Tor, not a replacement.[6]
See also[]
- Anonymous web browsing
- Internet censorship circumvention
- Internet privacy
- Onion routing
- Tor (anonymity network)
- RetroShare
References[]
- ^ Kwon, Albert; Lazar, David; Devadas, Srinivas; Ford, Bryan (1 April 2016). "Riffle: An Efficient Communication System With Strong Anonymity" (PDF). Proceedings on Privacy Enhancing Technologies. 2: 115–134. doi:10.1515/popets-2016-0008.
- ^ Uchill, Joe (2016-07-11). "Researchers tout new anonymity network". TheHill. Retrieved 2021-02-12.
- ^ Francisco, Iain Thomson in San. "Meet Riffle, the next-gen anonymity network that hopes to trounce Tor". www.theregister.com. Retrieved 2021-02-12.
- ^ Larry Hardesty (11 July 2016). "How to stay anonymous online". MIT News.
- ^ Sickert, Teresa (2016-07-21). "Riffle: Neue Tor-Alternative soll noch mehr Sicherheit bieten". Der Spiegel (in German). Archived from the original on 2016-07-24. Retrieved 2021-02-12.
- ^ "Building a new Tor that can resist next-generation state surveillance". Ars Technica. 2016-08-31. Retrieved 2021-02-12.
{{cite web}}
: CS1 maint: url-status (link)
External links[]
Categories:
- Secure communication
- Anonymity networks
- Massachusetts Institute of Technology
- Internet stubs